Search This Blog

Tuesday, May 05, 2009

IA career development: Need for IA professionals will grow

Information assurance careers in a struggling economy
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Citrix
rule

Citrix Integrated Web Application Security
With application layer attacks on the rise, the need for a comprehensive security solution has never been greater. Benefit from Citrix NetScaler, a single, integrated appliance to accelerate Web applications, improve availability and enhance web app security.

rule

Spotlight Story
IA career development: Need for IA professionals will grow

M. E. Kabay By M. E. Kabay
We will see increasing integration of information assurance into the strategic thinking of organizations as managers realize that the economic downturn increases pressures for illegality. Employees and managers who are desperate for continued employment may find their ethical standards weakening; we already have documented cases from past years of employees and managers who have broken into competitors' systems to acquire competitive intelligence or to steal intellectual property that will yield an immediate economic advantage to their current employers. How many more will we see as they contemplate the specter of job loss? Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Accreditation for IA-related Web sites Is there any way that a newcomer to information assurance (IA) can receive guidance on the trustworthiness of information about IA posted on the Web? How is a beginner to know whether the site is well researched or ...

CISSP-holders save time and money toward degree Readers are aware that I've been involved with the creation and direction of the Master of Science in Information Assurance program at Norwich University since its inception in 2002. I am delighted to report that the ...

Information assurance in Beer-sheba In the Jewish tradition, we read the Torah (the Pentateuch, or the first five books of the Bible) every year, so it is a pretty familiar story for me. I often arrive at shul (synagogue, temple) early on Saturday ...

Extreme weather and business continuity Does climate change have any relevance for information assurance and business continuity? My friend and colleague John Orlando, program director of the Master

Strengthening defenses against cyberwar In my last column, I pointed to a valuable paper from _NATO Review_ in Winter 2001-2002 that you can use in educating upper management about the strategic importance of information assurance not only for your ...

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Citrix
rule

Citrix Integrated Web Application Security
With application layer attacks on the rise, the need for a comprehensive security solution has never been greater. Benefit from Citrix NetScaler, a single, integrated appliance to accelerate Web applications, improve availability and enhance web app security.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

05/05/09

Today's most-read stories:

  1. Illinois programmer sues Google over "Android"
  2. Why mix Bluetooth with Wi-Fi?
  3. Use the Cisco restroom at your own risk
  4. Is it time to cut the Ethernet access cable?
  5. Some IT skills see pay hikes during downturn
  6. Juniper bolsters branch router, switch lines
  7. LexisNexis says its data was used by fraudsters
  8. Who's on deck to replace Cisco's Chambers?
  9. Microsoft aligning management, clouds
  10. Eliminate network gear maintenance fees to save big money
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: